summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-11-11merge lld-16.0.6Robert Nagy
2023-11-11import of lld from LLVM-16.0.6Robert Nagy
2023-11-11merge clang-16.0.6Robert Nagy
2023-11-11import of clang from LLVM-16.0.6Robert Nagy
2023-11-11merge llvm-16.0.6Robert Nagy
2023-11-11Randomly linked riscv64 kernels built with clang/lld-16 hang too oftenJeremie Courreges-Anglas
Use cat instead of sort -R to disable random relinking for now, until we find the culprit. For whoever interested, using cat or sort avoids the problem but using sort -r makes it 100% reproducible in my tests. Suggested by deraadt@
2023-11-11import of llvm from LLVM 16.0.6Robert Nagy
2023-11-11Enable CD9660 in RAMDISK so we can mount CD-ROMs.Patrick Wildt
ok jsg@
2021-12-17Import LLVM 13.0.0 release.Patrick Wildt
2021-04-28Import LLVM 11.1.0 release including clang, lld and lldb.Patrick Wildt
2020-08-03Import LLVM 10.0.0 release including clang, lld and lldb.Patrick Wildt
ok hackroom tested by plenty
2020-08-03Import LLVM 10.0.0 release including clang, lld and lldb.Patrick Wildt
ok hackroom tested by plenty
2023-11-11Attach dwqe(4) to Intel Elkhart Lake PSE SGMII devices.Stefan Sperling
Patch by msaitoh@netbsd, who tested both PSE SGMII ports on a Helix 330.
2023-11-11Correct wrong register offset macros for dwqe(4) DMA burst length.Stefan Sperling
Intel Elkhart Lake Ethernet now reaches 934 Mbps Tx/Rx in my testing. Patch by msaitoh@netbsd, thanks! Tested by myself on Elkhart Lake, dlg@ on arm64, and jca@ on riscv. ok dlg@ patrick@
2023-11-11Pass constant struct sockaddr to interface lookup functions.Alexander Bluhm
OK mvs@
2023-11-11We do not define VERSION anymore.Antoine Jacoutot
2023-11-11start documenting the protections or locks needed for struct rtentry fields.David Gwynne
this is the result of a bunch of discussion at h2k23. ok claudio@ mvs@ bluhm@
2023-11-11Add DIST_TUPLE support documentation.Antoine Jacoutot
2023-11-11Mention that this module also supports meson(1).Antoine Jacoutot
2023-11-11Remove unused parameter dst from art_get().Alexander Bluhm
OK mvs@
2023-11-11Dumb my latin down to vernacular englishMarc Espie
2023-11-11document UNLINKED/BUILD_UNLINKEDMarc Espie
2023-11-11Fix a few bugs in X509v3_asid_add*()Theo Buehler
These 'builder' functions, usually used together, can result in corrupt ASIdentifiers on failure. In general, no caller should ever try to recover from OpenSSL API failure. There are simply too many traps. We can still make an effort to leave the objects in unmodified state on failure. This is tricky because ownership transfer happens. Unfortunately a really clean version of this seems impossible, maybe a future iteration will bring improvements... The nasty bit here is that the caller of X509v3_asid_add_id_or_range() can't know from the return value whether ownership of min and max was transferred or not. An inspection of (*choice)->u.range is required. If a caller frees min and max after sk_ASIdOrRange_push() failed, there is a double free. All these complications could have been avoided if the API interface had simply used uint32_t instead of ASN1_INTEGERs. The entire RFC 3779 API was clearly written without proper review. I don't know if there ever was an actual consumer before rpki-client. If it existed, nobody with the requisite skill set looked at it in depth. ok beck for the general direction with a lot of input and ok jsing
2023-11-11Cope with recent rt_hash() const changes.Anton Lindqvist
2023-11-11Ignore -N in "gzip -dN <in.gz" and "zcat -N in.gz"George Koehler
Have -c override -N, like other gzip implementations. Before, our -N (decompress to stored name) overrode -c (cat to stdout) and crashed with a pledge violation, because the pledge for -c excludes wpath. Guilherme Janczak reported the pledge violation in July 2022 and provided a diff to prevent it, along with a regress test. I rewrote the diff and expanded the regress. ok kn@ millert@
2023-11-11Delete the useless .\" ----- comments before .Sh.Ingo Schwarze
Wo don't have them anywhere else, so we don't need them here. No text change.
2023-11-11more details about error recoveryIngo Schwarze
OK millert@ jmc@ triggered by a question from cheloha@
2023-11-10rtable_match() takes constant destination.Alexander Bluhm
For implementing MP safe route lookup, it helps to know which function parameters are constant. Add some const declarations, so that the compiler guarantees that sockaddr dst parameter of rtable_match() does not change. OK dlg@
2023-11-10Mention gnome in DIST_TUPLE.Antoine Jacoutot
2023-11-10zap some unused includesJasper Lievisse Adriaanse
2023-11-10scsi_xs_get() sets xs->flags via scsi_xs_io(). There is no needKenneth R Westerback
to separately add another flag via SET(). Just pass the correct combo to scsi_xs_get(). ok dlg@
2023-11-10Also mention COMPILER_LANGS for CFLAGS_${CHOSEN_COMPILER}Jeremie Courreges-Anglas
Suggested by espie@ While here, sprinkle more .Ev.
2023-11-10Add doc for CFLAGS_${CHOSEN_COMPILER} and CXXFLAGS_${CHOSEN_COMPILER}Jeremie Courreges-Anglas
ok tb@
2023-11-10GPT partitions have many attributes. Don't stomp on them all whenKenneth R Westerback
using 'flag <part #>' to make a partition the only bootable partition. Just turn off the bootable bit in the other partitions. ok dlg@
2023-11-10sync with NetBSD -r1.38:Jasper Lievisse Adriaanse
remove unused NULL pointer that was passed to printf %s.
2023-11-10Make ifq and ifiq interface MP safe.Alexander Bluhm
Rename ifq_set_maxlen() to ifq_init_maxlen(). This function neither uses WRITE_ONCE() nor a mutex and is called before the ifq mutex is initialized. The new name expresses that it should be used only during interface attach when there is no concurrency. Protect ifq_len(), ifq_empty(), ifiq_len(), and ifiq_empty() with READ_ONCE(). They can be used without lock as they only read a single integer. OK dlg@
2023-11-10Enhance 'flag' to accept hex values in addition to the current 0Kenneth R Westerback
.. INT64_MAX decimal values.. Easier to specify the 64 bits of GPT partition attributes and 0x8000000000000000 (a.k.a. MS_NOAUTOMOUNT, a.k.a. 1 << 63) becomes accessable. Prompted by bug report and testing by Philippe Meunier. Thanks! ok dlg@
2023-11-10remove unused liblldbPluginOperatingSystemRobert Nagy
2023-11-10bsd.port.mk.5: document variables related to sccache, such as USE_SCCACHECaspar Schutijser
Tweak from kn@ OK landry@ kn@
2023-11-10Add an initial SNMPv3 regression test.Martijn van Duren
2023-11-10regenJonathan Gray
2023-11-10add "Phoenix 2" APU device idJonathan Gray
Phoenix 2 parts include both Zen4 and Zen4c cores used by Ryzen Z1, Ryzen 5 7545U, Ryzen 3 7440U with cpuid 19-78-00
2023-11-10Give ober_printf_elements() a ber_element array, similar toMartijn van Duren
ober_scanf_elements(). This allows us to move down and back up multiple levels in with nested sequences and sets. While here, on failure, make sure we free (and unlink if needed) all elements we created. OK claudio@, tb@
2023-11-10accept numerical user IDsKlemens Nanni
Turn [-U username] into [-U user] to match top(1)/pgrep(1)/fstat(1) -U/-u taking both "root" and "0". Feedback OK millert
2023-11-10Always prefer group from initial KE payload as responder if supported.Tobias Heider
from markus@
2023-11-10Make further use of netcat server close barrier in regress to reduceAnton Lindqvist
flakiness.
2023-11-10MNT_SOFTDEP and mount -o softdep no longer have any effectIngo Schwarze
OK kn@ jmc@
2023-11-09Run arp timeout without kernel lock.Alexander Bluhm
Since cheloha@ has implemented timeout processes that do not grab the kernel lock, start using TIMEOUT_MPSAFE for arptimer(). OK kn@ mvs@
2023-11-09Forgot to fix the RFC number in the new commentTheo Buehler
2023-11-09Convert PKCS7_SIGNER_INFO_set() to X509_ALGOR_set0_by_nid()Theo Buehler
This is a straightforward conversion because I'm not going to start a cleanup here. Explain why this is not using X509_ALGOR_set_md(). See below. ok jca Let me include a beautiful note from RFC 5754 in its entirety: NOTE: There are two possible encodings for the AlgorithmIdentifier parameters field associated with these object identifiers. The two alternatives arise from the loss of the OPTIONAL associated with the algorithm identifier parameters when the 1988 syntax for AlgorithmIdentifier was translated into the 1997 syntax. Later, the OPTIONAL was recovered via a defect report, but by then many people thought that algorithm parameters were mandatory. Because of this history, some implementations encode parameters as a NULL element while others omit them entirely. The correct encoding is to omit the parameters field; however, when some uses of these algorithms were defined, it was done using the NULL parameters rather than absent parameters. For example, PKCS#1 [RFC3447] requires that the padding used for RSA signatures (EMSA-PKCS1-v1_5) MUST use SHA2 AlgorithmIdentifiers with NULL parameters (to clarify, the requirement "MUST generate SHA2 AlgorithmIdentifiers with absent parameters" in the previous paragraph does not apply to this padding).